Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 9, Issue 6 - Dec 2008
Volume 9, Issue 5 - Oct 2008
Volume 9, Issue 4 - Aug 2008
Volume 9, Issue 3 - Jun 2008
Volume 9, Issue 2 - Apr 2008
Volume 9, Issue 1 - Feb 2008
Selecting the target year
A Property-Based Data Sealing using the Weakest Precondition Concept
Park, Tae-Jin ; Park, Jun-Cheol ;
Journal of Internet Computing and Services, volume 9, issue 6, 2008, Pages 1~13
Trusted Computing is a hardware-based technology that aims to guarantee security for machines beyond their users' control by providing security on computing hardware and software. TPM(Trusted Platform Module), the trusted platform specified by the Trusted Computing Group, acts as the roots for the trusted data storage and the trusted reporting of platform configuration. Data sealing encrypts secret data with a key and the platform's configuration at the time of encryption. In contrast to the traditional data sealing based on binary hash values of the platform configuration, a new approach called property-based data sealing was recently suggested. In this paper, we propose and analyze a new property-based data sealing protocol using the weakest precondition concept by Dijkstra. The proposed protocol resolves the problem of system updates by allowing sealed data to be unsealed at any configuration providing the required property. It assumes practically implementable trusted third parties only and protects platform's privacy when communicating. We demonstrate the proposed protocol's operability with any TPM chip by implementing and running the protocol on a software TPM emulator by Strasser. The proposed scheme can be deployed in PDAs and smart phones over wireless mobile networks as well as desktop PCs.
IDs Assignment of Hybrid Method for Efficient and Secure USN (Ubiquitous Sensor Networks)
Sung, Soon-Hwa ;
Journal of Internet Computing and Services, volume 9, issue 6, 2008, Pages 15~25
Due to the differences between a mobile ad-hoc network and a sensor network, the pre-existing autoconfiguration for a mobile ad-hoc network cannot be simply applied to a sensor network. But. a mechanism is still necessary to assign locally unique addresses to sensor nodes efficiently. This paper proposes a hybrid IDs assignment scheme of local area sensor networks. The IDs assignment scheme of hybrid method combines a proactive IDs assignment with a reactive IDs assignment scheme. The proposed scheme considers efficient communication using reactive IDs assignment, and security for potential attacks using zone-based self-organized clustering with Byzantine Agreement in sensor networks. Thus, this paper has solved the shortage of security due to minimizing network traffic and the problem of repairing the network from the effects of an aberrant node in sensor networks.
Design and Evaluation of an Anomaly Detection Method based on Cross-Feature Analysis using Rough Sets for MANETs
Bae, Ihn-Han ; Lee, Hwa-Ju ;
Journal of Internet Computing and Services, volume 9, issue 6, 2008, Pages 27~35
With the proliferation of wireless devices, mobile ad-hoc networking (MANETS) has become a very exciting and important technology. However, MANET is more vulnerable than wired networking. Existing security mechanisms designed for wired networks have to be redesigned in this new environment. In this paper, we discuss the problem of anomaly detection in MANET. The focus of our research is on techniques for automatically constructing anomaly detection models that are capable of detecting new or unseen attacks. We propose a new anomaly detection method for MANETs. The proposed method performs cross-feature analysis on the basis of Rough sets to capture the inter-feature correlation patterns in normal traffic. The performance of the proposed method is evaluated through a simulation. The results show that the performance of the proposed method is superior to the performance of Huang method that uses cross-feature based on the probability of feature attribute value. Accordingly, we know that the proposed method effectively detects anomalies.
Stateful Virtual Proxy Server for Attack Detection based on SIP Protocol State Monitoring Mechanism
Lee, Hyung-Woo ;
Journal of Internet Computing and Services, volume 9, issue 6, 2008, Pages 37~48
VoIP service is a transmission of voice data using SIP protocol on IP based network, The SIP protocol has many advantages such as providing IP based voice communication and multimedia service with cheap communication cost and so on. Therefore the SIP protocol spread out very quickly. But, SIP protocol exposes new forms of vulnerabilities on malicious attacks such as Message Flooding attack and protocol parsing attack. And it also suffers threats from many existing vulnerabilities like on IP based protocol. In this paper, we propose a new Virtual Proxy Server system in front of the existed Proxy Server for anomaly detection of SIP attack and stateful management of SIP session with enhanced security. Based on stateful virtual proxy server, out solution shows promising SIP Message Flooding attack verification and detection performance with minimized latency on SIP packet transmission.
A study on automation of AV(Atomic Vulnerability) ID assignment
Kim, Hyung-Jong ;
Journal of Internet Computing and Services, volume 9, issue 6, 2008, Pages 49~62
AV (Atomic Vulnerability) is a conceptual definition representing a vulnerability in a systematic way, AVs are defined with respect to its type, location, and result. It is important information for meaning based vulnerability analysis method. Therefore the existing vulnerability can be expressed using multiple AVs, CVE (common vulnerability exposures) which is the most well-known vulnerability information describes the vulnerability exploiting mechanism using natural language. Therefore, for the AV-based analysis, it is necessary to search specific keyword from CVE's description and classify it using keyword and determination method. This paper introduces software design and implementation result, which can be used for atomic vulnerability analysis. The contribution of this work is in design and implementation of software which converts informal vulnerability description into formal AV based vulnerability definition.
A Study on Secure and Efficient Heterogenous Network Management Scheme based on Static TTP
Seo, Dae-Hee ; Baek, Jang-Mi ; Cho, Dong-Sub ;
Journal of Internet Computing and Services, volume 9, issue 6, 2008, Pages 63~72
Recent heterogeneous network management researches on information security, however, deal only with simple management using PKI and could not sufficiently address the different kinds of security problems that could arise in a heterogeneous network. Thus, various security requirements should first be satisfied and a security management protocol should first be developed to achieve a secure heterogeneous network. Hence, in this paper, various secure and effective heterogeneous network management that address security issues, which were merely a consideration in existing studies, are proposed. The proposed scheme for the protection of the user privacy is the central object and static middle objects of the process used to mutual authentication, also if communication between users is required 1-out-2 oblivious transfer to communicate by using secret communication, as well as the effectiveness and security conscious approach. Specially The proposed scheme is designed to enhance security and efficiency related to various services required in heterogeneous network, based on the reliable peripheral devices for TTP. Using Mobile device, which has been applied to electronic commerce transactions in existing schemes, this study also proposed an appropriate management scheme that is suitable for a dynamic environment and setting a temporary group to provide various services.
Enhanced Transaction Signing-based Authentication Scheme for Secure Internet Banking
Lim, Hyung-Jin ; Lee, Jeong-Gun ; Kim, Moon-Seong ;
Journal of Internet Computing and Services, volume 9, issue 6, 2008, Pages 73~79
Nowadays, all over the world's banks use internet banking through various authentication methods. Although there are strong authentication methods using OTP (One Time Password), there still has vulnerability from sophisticated attacks such as MITM (Man In The Middle). This letter proposes signing-based authentication protocol that copes with attacks, such as MITB (Man In The Browser), and provides non-repudiation function. The protocol shows generic method to prevent the sophisticated attacks through connecting advantages from OTP and PKI (Public Key Infrastructure) certificate, and that can be deployed to various extended form in internet banking.
Forensic Watermarking for Digital Cinema Using Temporal Chrominance Differences
Yang, Se-Yol ; Choi, Hyuk ;
Journal of Internet Computing and Services, volume 9, issue 6, 2008, Pages 81~87
In this paper, we propose a forensic watermarking scheme using temporal differences of video chrominance values. Proposed method has low complexity and good visual quality, which is suitable for traitor tracing of digital cinema. Experimental results show that our forensic watermarking method has good detection performance and is robust to several attacks, such as camcorder recording and video compression.
Scalability Estimations of a Workcase-based Workflow Engine
Ahn, Hyung-Jin ; Park, Min-Jae ; Lee, Ki-Won ; Kim, Kwang-Hoon ;
Journal of Internet Computing and Services, volume 9, issue 6, 2008, Pages 89~97
Recently, many organizations such as companies or institutions have demanded induction of very large-scale workflow management system in order to process a large number of business-instances. Workflow-related vendors have focused on physical extension of workflow engines based on device-level clustering, so as to provide very large-scale workflow services. Performance improvement of workflow engine by simple physical-connection among computer systems which don't consider logical-level software architecture lead to wastes of time and cost for construction of very large-scale workflow service environment. In this paper, we propose methodology for performance improvement based on logical software architectures of workflow engine. We also evaluate scalable performance between workflow engines using the activity instance based architecture and workcase based architecture, our proposed architecture. Through analysis of this test's result, we can observe that software architectures to be applied on a workflow engine have an effect on scalable performance.
Design and Performance Analysis of Welfare Management System based on WSN
Kim, Ji-Seong ; Kim, Kang-Hee ; Hwang, Ho-Young ; Suh, Hyo-Joong ;
Journal of Internet Computing and Services, volume 9, issue 6, 2008, Pages 99~107
Wireless sensor networks (WSN) based on low-power technologies become important portion of ubiquitous systems. In this paper, we introduce a WSN-based welfare management system as one of the WSN applications. Especially, we implement S-MAC (Sensor Medium Access control) protocol on our system that saves both cost and power consumption, and we evaluate system performances using the TOSSIM simulator. Sensors and a small database server are placed in the house of participant, which collects and stores some environment conditions of the house. The small servers are connected to each others by wireless ad-hoc network.
A Design of The Tailored Learning Navigation based on The Learning Pattern of Learner
Jeong, Hwa-Young ;
Journal of Internet Computing and Services, volume 9, issue 6, 2008, Pages 109~115
A lot of methods to improve the learning effect of learners in E-learning have been researched and applied. In roost E-learning systems, the learning navigation presenting the learning course and progress to learners is applied. But roost learning course and progress are designed by teacher beforehand and learners study the learning course and progress already fixed. In this research, a learning navigation which can change the learning course and progress dynamically according to learner's learning effect is presented. For this purpose, the factors which define the learning course and progress by learning chapters, contents and item difficulties were classified and each process logic was analyzed through CSP.
The Implemention of RTD-l000A based on ARM Microcontroller
Kim, Min-Ho ; Hong, In-Sik ;
Journal of Internet Computing and Services, volume 9, issue 6, 2008, Pages 117~125
With increase of concern about the Ubiquitous application, the necessity of the computer system which is miniaturized is becoming larger. The ARM processor is showing a high share from embedded system market. In this paper, ideal method for RTD-1000 controller construction and development is described using ARM microcontroller. Existing RTD-1000 measures distance of disconnection or defect of sensing casket by measuring receiving reflected wave which was sent via copper wire inside the leaking sensing rod. Using this RTD-1000, leakage and breakage of water and oil pipe can be sensed and it reports damage results to the networks. But, existing RTD-1000 wastes hardware resources much and costs a great deal to installation. Also, it needs a cooling device because the heating problem, and has some problem of the secondary memory unit such as the hard disk. So, long tenn maintenance has some problems in the outside install place. In this paper, for the resolving the problem of RTD-1000, RTD-1000A embedded system based on ARM is proposed and simulated.
A Study on UMPC's Role in u-Learning
Yi, Mun-Ho ; Kim, Mi-Ryang ;
Journal of Internet Computing and Services, volume 9, issue 6, 2008, Pages 127~139
The value of up-to-date Mobile PC such as UMPC (Ultra Mobile Personal Computer) is recognized greatly in learning environment that busywork such as characteristic of transfer easy and real time communication possibility etc. and conversation with a colleague student, free sending of studying data and public ownership etc. is required. Wish to recognize whether is acting relevant role in u - unfold learning that inflect UMPC in integration research model, and UMPC is u searching for relevant element at studying activity unfolding process u - integration Inquiry-Based Learning that present in Korean education & research information service (KERIS) at fifth-year student science time In primary school in this research. This research result could take charge role of UMPCs' studying-activity though there is persistent feedback with teacher among studying-activity although UMPC's role is utilized on constituent that can be related with studying-activity in learning process.
Association Method for SCORM-based Learning Course Generation
Yoon, Hyun-Nim ; Kim, Yang-Woo ;
Journal of Internet Computing and Services, volume 9, issue 6, 2008, Pages 141~153
E-learning is a new paradigm of education using Internet media. E-learning is rapidly expanding, since it is not restricted by time and space. However, due to the lack of standardization in e-learning, learning contents are developed redundantly. SCORM has been proposed to address this standardization problems. The mere learning contents are shared, the higher the reusability of contents becomes. Therefore, it is needed to develop methods or tools to help educators or content producers to create a learning course easily. In this paper, we propose an association method that could help educators or content producers to efficiently generate learning courses for a subject. The association method, a learning course generation method suggested by this paper, makes use of existing learning courses and learning contents to create new learning courses suitable to a subject. The association method analyzes statistical information of leaning objects derived from existing learning courses and measures coherence between learning objects to create a learning course. The association method suggested by this paper not only supports educators or content producers for easy generation of learning course but also offers a guideline for developing learning courses.
Development of 3 layer EVM(Earned Value Management) Guideline for XP(eXtreme programming) based on CMMI
Jeong, Mi-Seo ; Han, Hyuk-Soo ;
Journal of Internet Computing and Services, volume 9, issue 6, 2008, Pages 155~163
Project Monitoring and Control is one of the required activities in project management. This activity provides the information about whether a project is making a progress as it is planned. It is usually performed in weekly meetings or milestone meetings where the project manager checks the project's current status based on project measures such as schedule, cost and work performance. One of the popular method for project monitoring and control is EVM(Earned Value Management). The major characteristic of EVM is that it uses only one measure 'cost' for schedule and work performance so that it enables 2 independent graphs to be illustrated in one integrated graph based on cost. For applying EVM to a project, it is essential to break whole work to work packages and to assign value of cost to each work package at the initial stage of the project. Therefore EVM is well matched with the lifecycle which requires whole plan at the beginning of project. However, in XP(eXtreme Programming), whole customer requirements are difficult to define and to make a complete plan at the beginning and are more detailed in each Iteration. Therefore EVM is not comfortable method for XP. Therefore in this research we suggest 3 layer EVM which can be applied in XP, and develop a process guidelines based on CMMI(Capability Maturity Model Integration) PMC(Project Monitoring and Control) process area.
A Naive Bayesian-based Model of the Opponent's Policy for Efficient Multiagent Reinforcement Learning
Kwon, Ki-Duk ;
Journal of Internet Computing and Services, volume 9, issue 6, 2008, Pages 165~177
An important issue in Multiagent reinforcement learning is how an agent should learn its optimal policy in a dynamic environment where there exist other agents able to influence its own performance. Most previous works for Multiagent reinforcement learning tend to apply single-agent reinforcement learning techniques without any extensions or require some unrealistic assumptions even though they use explicit models of other agents. In this paper, a Naive Bayesian based policy model of the opponent agent is introduced and then the Multiagent reinforcement learning method using this model is explained. Unlike previous works, the proposed Multiagent reinforcement learning method utilizes the Naive Bayesian based policy model, not the Q function model of the opponent agent. Moreover, this learning method can improve learning efficiency by using a simpler one than other richer but time-consuming policy models such as Finite State Machines(FSM) and Markov chains. In this paper, the Cat and Mouse game is introduced as an adversarial Multiagent environment. And then effectiveness of the proposed Naive Bayesian based policy model is analyzed through experiments using this game as test-bed.
Enhanced Bandwidth Estimation for TCP Westwood
Kang, Moon-Soo ; Shin, Seok-Joo ;
Journal of Internet Computing and Services, volume 9, issue 6, 2008, Pages 179~188
Even though a lot of researches to improve the performance of TCP over wireless networks have been performed, the performance of TCP cannot satisfy users under high packet loss rate of wireless networks. This paper addresses the problem of TCP Westwood under high packet loss rate and reveals the reasons through the extensive simulation analysis. The ABE(Available Bandwidth Estimation) of TCP westwood becomes incorrect due to TCP dynamics of loss recovery. Based on this observation, we propose two algorithms for enhancing the correctness of ABE. We have evaluated the effects of the proposed algorithms through simulation. The proposed algorithms have achieved more correct ABE under the packet loss rate less than 1%.